Discovering a Secure Path in MANET by Avoiding Black Hole Attack
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 8
Abstract
In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multi-hop routes to the destination node. Due to the lack of infrastructure in such networks, secure and reliable packet delivery is challenging. The performance of a Mobile Ad hoc Network (MANET) is closely related to the capability of the implemented routing protocol to adapt itself to unpredictable changes of topology network and link status. One of this routing protocol is OLSR [1] (Optimized Link State Routing Protocol) which assumes that all nodes are trusted. However, in hostile environnement, the OLSR is known to be vulnerable to various kinds of malicious attacks. This paper proposes a cooperative black hole attack against MANETs exploiting vulnerabilities of OLSR. In this attack, two attacking nodes cooperate in order to disrupt the topology discovery and prevent routes to a target node from being established in the network.
Authors and Affiliations
Hicham Zougagh, Ahmed Toumanari, Rachid Latif, Y. Elmourabit, Noureddine Idboufker
Similarity Calculation Method of Chinese Short Text Based on Semantic Feature Space
In order to improve the accuracy of short text similarity calculation, this paper presents the idea that use the history of short text messages to construct semantic feature space, then use the vector in semantic feature...
Comparison between Commensurate and Non-commensurate Fractional Systems
This article deals with fractional systems that rep-resent better physical process and guarantee a very small number of parameters that can reduces the computation time. It focuses in particular on the state-space repres...
Prediction of Stroke using Data Mining Classification Techniques
Stroke is a neurological disease that occurs when a brain cells die as a result of oxygen and nutrient deficiency. Stroke detection within the first few hours improves the chances to prevent complications and improve hea...
CREeLS: Crowdsourcing based Requirements Elicitation for eLearning Systems
Crowdsourcing is the process of having a task performed by the crowd. Because of the Web evolution, recently crowdsourcing is being used in the field of Requirements Engineering to help in simplifying its activities. Amo...
Hijaiyah Letter Interactive Learning for Mild Mental Retardation Children using Gillingham Method and Augmented Reality
Assistive technology for children with special needs is a problem that is interesting to study. Collaboration between methods and latest technology can be used as a learning aid for them. Learning of Hijaiyah letters is...